Explore tens of thousands of sets crafted by our community.
Critical OS Vulnerabilities
25
Flashcards
0/25
Meltdown
Exploits critical vulnerabilities in modern processors to read privileged memory from an unprivileged user, even without permissions. Mitigations include kernel patches like Kernel Page Table Isolation (KPTI) and avoiding untrusted programs.
Directory Traversal
An attack that allows access to files and directories that are stored outside the web root folder. To mitigate, validate user input, avoid using user input to access file systems, and employ directory traversal protection features.
Rootkits
A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. Mitigations include anti-rootkit software, maintaining secure authentication procedures, and regular system checks.
Buffer Overflow
Occurs when a program writes more data to a buffer than it was intended to hold. Possible mitigations include implementing bounds checking, using languages that enforce memory safety, and adopting Address Space Layout Randomization (ASLR).
Heap Corruption
Occurs when there is a write to a portion of memory that has been allocated to the heap, causing unexpected behavior in a program. Mitigations include using a memory-safe language, heap canaries, and enforcing strict memory management.
Use-After-Free
When a program references memory after it has been freed, which can lead to code execution or crashing. Mitigations include using tools that help detect use-after-free errors and avoiding manual memory management.
Heartbleed
A security flaw in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. Mitigation involves updating to a fixed version of OpenSSL, revoking compromised keys, and reissuing new keys.
Rowhammer
An attack that exploits physical weaknesses in memory chips to flip the values of bits in memory. Mitigations include using memory modules with error-correcting code (ECC) and deploying security patches from hardware vendors.
Remote Code Execution (RCE)
When an attacker has the ability to make a remote system run arbitrary code. Mitigation can involve disabling unnecessary services, using firewalls, and keeping software up-to-date.
Cross-Site Scripting (XSS)
This occurs when an attacker manages to inject malicious scripts into content from otherwise reputable websites. Mitigations include implementing content security policy, validating and sanitizing user input, and using anti-XSS libraries.
Time-of-Check to Time-of-Use (TOCTOU)
A race condition where a system resource's state can change between checking it and using it. Mitigations involve atomic operations, file locking, and minimizing the window of opportunity for state change.
Stack Clashing
A form of attack that causes a stack to collide with another memory region. Mitigation strategies include using a larger stack guard, enabling stack-smashing protection, and reordering variables.
Symlink Race
Occurs when a symbolic link is created between the checking of a path and its usage, allowing an attacker scope to manipulate the symlink. Mitigations include employing privilege separation and user/file capabilities.
Insecure Object References
Occurs when an application provides direct access to objects based on user-supplied input. Mitigations include not exposing internal object references to users and employing access control checks.
Integer Overflow
Occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits. Mitigations involve safe mathematical functions and validating all inputs.
KRACK (Key Reinstallation Attacks)
A severe replay attack on the Wi-Fi Protected Access protocol that secures Wi-Fi connections. Mitigations include updating Wi-Fi devices with patches provided by manufacturers and using a secure channel over Wi-Fi such as VPN.
Spectre
A vulnerability that forces a program to access arbitrary locations in program memory. Mitigations include installing patches provided by hardware and software vendors and recompiling software with new compilers designed to protect against the vulnerability.
Privilege Escalation
Occurs when a user gains privileges they are not entitled to due to flaws in software design. Mitigations include patching software, using least privilege principles, and system call filtering.
SQL Injection
An attack that involves insertion of an SQL query via the input data from the client to the application. Mitigations include prepared statements, stored procedures, and input validation with whitelisting.
Side-Channel Attack
Any attack based on information gained from the physical implementation of a computer system. Mitigations include using constant-time algorithms and being aware of cache usage patterns.
Denial of Service (DoS)
An attack intended to shut down a machine or network, making it inaccessible to its intended users. Mitigations include robust network architecture, rate limiting, and filtering traffic.
Phishing
A technique of fraudulently obtaining private information. Mitigations involve user education, using spam filters, and implementing strong authentication mechanisms.
Race Condition
A flaw that occurs when the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. Mitigations involve using mutexes, semaphores, and ensuring threads or processes do not adversely affect each other.
Man-in-the-Middle Attack
Occurs when an attacker secretly relays and possibly alters the communication between two parties. Mitigations include using encrypted connections, employing certificate pinning, and robust authentication mechanisms.
EternalBlue
A cyberattack exploit developed by the U.S. National Security Agency (NSA) according to leaked files, that targets the Microsoft Windows operating system. Mitigation involves applying security updates released by Microsoft to patch the vulnerability.
© Hypatia.Tech. 2024 All rights reserved.